Описание
Security update for qemu
This update for qemu fixes the following issues:
- CVE-2021-3595: Fixed an invalid pointer initialization may lead to information disclosure (tftp). (bsc#1187366)
- CVE-2021-3592: Fixed an invalid pointer initialization may lead to information disclosure (bootp). (bsc#1187364)
- CVE-2021-3594: Fixed an invalid pointer initialization may lead to information disclosure (udp). (bsc#1187367)
- CVE-2021-3593: Fixed an invalid pointer initialization may lead to information disclosure (udp6). (bsc#1187365)
- CVE-2021-3611: Fixed a segmentation fault due to stack overflow. (bsc#1187529)
Список пакетов
SUSE Linux Enterprise Server 12 SP2-BCL
Ссылки
- Link for SUSE-SU-2021:2428-1
- E-Mail link for SUSE-SU-2021:2428-1
- SUSE Security Ratings
- SUSE Bug 1187364
- SUSE Bug 1187365
- SUSE Bug 1187366
- SUSE Bug 1187367
- SUSE Bug 1187529
- SUSE CVE CVE-2021-3592 page
- SUSE CVE CVE-2021-3593 page
- SUSE CVE CVE-2021-3594 page
- SUSE CVE CVE-2021-3595 page
- SUSE CVE CVE-2021-3611 page
Описание
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Затронутые продукты
Ссылки
- CVE-2021-3592
- SUSE Bug 1187364
- SUSE Bug 1187369
Описание
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Затронутые продукты
Ссылки
- CVE-2021-3593
- SUSE Bug 1187365
Описание
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Затронутые продукты
Ссылки
- CVE-2021-3594
- SUSE Bug 1187367
Описание
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the 'tftp_t' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Затронутые продукты
Ссылки
- CVE-2021-3595
- SUSE Bug 1187366
- SUSE Bug 1187376
Описание
A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.
Затронутые продукты
Ссылки
- CVE-2021-3611
- SUSE Bug 1187529
- SUSE Bug 1193914